Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
Resource
win10v2004-20240709-en
General
-
Target
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
-
Size
1.2MB
-
MD5
496a8adbba26ad659a82985bb67dd85d
-
SHA1
a2026f727f69df0c156b6ce0569e86fc36faebe5
-
SHA256
9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40
-
SHA512
8817867174cb2e341515e31d218eb2059ed56909328e38b009b728b359703610a26fa571f6ec87ac81e28e828765ba121b4f9f6d11ff78e047a406725b667aad
-
SSDEEP
24576:idFMCC3AST5LLbFFUqlMvTzvLsx+4QhbCxKV/4n:olC35DUFXQg4QJCoV/2
Malware Config
Extracted
Protocol: ftp- Host:
framework.pcsoft.fr - Port:
21 - Username:
framework - Password:
framework
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe -
Executes dropped EXE 1 IoCs
pid Process 4424 InstallFramework.exe -
Loads dropped DLL 4 IoCs
pid Process 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3264 wrote to memory of 4424 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 88 PID 3264 wrote to memory of 4424 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 88 PID 3264 wrote to memory of 4424 3264 9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe"C:\Users\Admin\AppData\Local\Temp\9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe"C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe" /REP="C:\Users\Admin\AppData\Local\Temp\" /SILENT2⤵
- Executes dropped EXE
PID:4424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.5MB
MD50727189ee363736e77fdf71d94a7e71e
SHA1e259f9e5467a9d0d72da1f16bcd89eef0c05f3d4
SHA256fc74f1e4cd9c6593799b4834f87869b2d545cd713b8135ad92eeb388467afb42
SHA512a16fd73b90ed32806f7cb7e9aaea81cc2eb0b8742d965803cce2aa441948a31efda781c2ea32bb91702c315419e3d8630a9067d7e2f8a5fca0fba0887d716ab9
-
Filesize
2.6MB
MD53dcd002f7c4cc07db207954721de8c08
SHA1da2b437491bf7f3183c49add76132e305dd91998
SHA2565b309a42caa40d7591c112806084c9b156bfb23b59e7854ca1f9d6ab93d1caeb
SHA51204e41803d7ca266962581c5ecec24f7e5d7efdc770da26d58188fb731858078857f69e3a7f3756d2477b01c42ae417a8fb5d19466a54a1a581051ee146a637ab
-
Filesize
3.2MB
MD55a0b2319464811478e46b9d474559c6b
SHA131be25dc10e07b51627c842f22ac19bc87302655
SHA2564a3dddc6dfd21381d940fb6e43994af368082f82fb782c06b80d65dc3af34703
SHA51269d5f21832eb22b2292f09fcc49e6b435c9832bf0bc927e36804882445af2051006e0c3cafc7bdd226e49fcb731746bb1790e82bcbdf5269e3ccbc7e84f8427c
-
Filesize
2.3MB
MD503d44b2f98b3bb738b6fc6dd9e3506bd
SHA1a9a7edebb8f97ea159c24158a0e2c2ea5d030c70
SHA256a79e315d7babb618acc2470a8d074738c088901a894b82e928a351ba9e5d1ca3
SHA512d0a4849d18a43c240799eb1306a69f504744321c5665cac43159a393d229b22055a968ec365d118176bb3eda697e3e9a13012f2a627143acccacb51298557fdf
-
Filesize
728KB
MD50f2941d8ba3b515086d7433f333c16e9
SHA1ac423ab8c846a78a215d5dfd0280cf8597ee670c
SHA2569b2042f697a3a62430a26f0e164a95e912afc3a9b7e48f691f16001fdd907732
SHA5125223130d18f329ca590cb67898f339de18bc9858df5cbff089a1b7f5ecdb3fb09301fef1c0e4c0d450750b91a9a4c99f21318edb5abd1a90105c609f37c2309d